Nearly 100,000 Industrial Control Systems Exposed to the Internet
Thousands of organizations around the world are using industrial control systems (ICS) exposed to the public internet, new analysis from...
Thousands of organizations around the world are using industrial control systems (ICS) exposed to the public internet, new analysis from...
The potential for cybercriminals to use AI chatbots to create phishing campaigns has been cause for concern and now it...
The US Federal Bureau of Investigation (FBI) has issued a Private Industry Notification highlighting two concerning trends in the world...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoaccusoft -- imagegearAn out-of-bounds write vulnerability exists in the tiff_planar_adobe functionality of...
10/1/23 update adds Amazon statement below. Amazon mistakenly sent out purchase confirmation emails for Hotels.com, Google Play, and Mastercard gift...
A flaw related to the PKCS #1 v1.5 padding in SSL servers discovered in 1998 and believed to have been...
The LostTrust ransomware operation is believed to be a rebrand of MetaEncryptor, utilizing almost identical data leak sites and encryptors....
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoacronis -- cyber_protect_home_officeSensitive information disclosure due to insecure folder permissions. The following...
Cloudflare's Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security...
A sophisticated Chinese cyber-espionage campaign targeting Microsoft Outlook accounts gave Beijing access to tens of thousands of private US government...
Progress Software has urged customers to patch a critical new vulnerability in one of its flagship file transfer software products,...
Recent weeks have witnessed a significant increase in cyber-attacks targeting the US Postal Service (USPS), mainly through phishing and smishing...
The UK’s information commissioner has called for an immediate end to the use of excel spreadsheets to publish Freedom of Information...
The Russian firm Operation Zero has announced a staggering $20m reward for hacking tools capable of compromising iPhones and Android...
Microsoft’s Bing Chat has come under scrutiny due to a significant security concern – the infiltration of malicious ads.Malwarebytes researchers...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoacronis -- cyber_protect_home_officeSensitive information disclosure due to insecure folder permissions. The following...
The North Korean 'Lazarus' hacking group targeted employees of an aerospace company located in Spain with fake job opportunities to...
Sebastien Raoult, a 22-year-old from France, has pleaded guilty in the U.S. District Court of Seattle to conspiracy to commit...
Many Discord users attempting to access the popular instant messaging and VoIP social platform today have been met with a...
This week has been a busy ransomware week, with ransomware attacks having a massive impact on organizations and the fallout...
A critical zero-day vulnerability in all versions of Exim mail transfer agent (MTA) software can let unauthenticated attackers gain remote code...
Proof-of-concept exploit code has surfaced on GitHub for a critical authentication bypass vulnerability in Microsoft SharePoint Server, allowing privilege escalation. Tracked...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoacronis -- cyber_protect_home_officeSensitive information disclosure due to insecure folder permissions. The following...
Most people are barely thinking about basic cybersecurity, let alone post-quantum cryptography. But the impact of a post-quantum world is...